Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. | Online Course Course DetailsDescription: Network Assurance covers secure network practices necessary to protect networked systems against attacks and exploits. Network security administration topics include firewalls, intrusion detection/prevention, common cryptographic ciphers, AAA (authentication, authorization, and accounting), server and client security, and secure policy generation.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Prerequisites: Complete the following online courses:
- AWR-173
- AWR-175 or have a good knowledge and understanding of the following topics:
- Patching and updating
- Firewalls
- Malware
- Confidentiality, integrity, and availability
- Disclosure, alteration, and denial
- Vulnerabilities, attacks, and controls
- Types of attacks and attackers
- Controls
- Access Control
- TCP/IP Networking
- Networking basics and security
- Operating system security
- Encryption
Topics: Layered defenseSurveillance and reconnaissanceOutsider threat protection,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnelOther Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. | Online Course Course DetailsDescription: This course covers investigative methods and standards for the acquisition, extraction, preservation, analysis, and deposition of digital evidence from storage devices. This course offers a wide array of forensics situations that are applicable to the real world. Students will learn how to find traces of illegal or illicit activities left on disk with computer forensics tools and manual techniques, and how to recover data intentionally hidden or encrypted by perpetrators.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Prerequisites: There are no prerequisites for this class Topics: Evidentiary reportingComputer technologiesDigital evidence collection,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous Materials PersonnelOther Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
This intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law (copyright, trade secrets, unfair competition, and unfair business practices), personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information, and the First Amendment.
Two college credit hours are provided through ACE. | Online Course Course DetailsDescription: This intermediate course is designed to teach students the fundamentals of computer crime issues from a legal perspective. The training will highlight the various computer crimes and appropriate response by first defenders and others that may encounter these types of issues. Participants learn legislations and organizational efforts to control or prevent such crimes. This course covers intellectual property law (copyright, trade secrets, unfair competition, and unfair business practices), personal jurisdiction, electronic commerce and software contracts, telecommunications, antitrust, privacy, the right to accuracy of information, the right to access information, and the First Amendment.
Two college credit hours are provided through ACE. Prerequisites: Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us for more information on the approval process. Topics: Miscellaneous CybercrimesKey terms and concepts in cyber lawIntellectual property cybercrimesTrademarks and domain name theftInternet fraudElectronic evidence and E-discovery,Audience: - Emergency management agency
- Emergency medical services
- Fire service
- Governmental administrative
- Law enforcement
- Healthcare
- Public health
- Public safety communications
- Public works
- Hazardous materials personnel
Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, contact us. |
This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. | Online Course Course DetailsDescription: This course covers various incident analysis tools and techniques that support dynamic vulnerability analysis and elimination, intrusion detection, attack protection, and network/resources repair. The trainee will be presented with real-world examples and scenarios to help provide knowledge, understanding, and capacity for effective cyber incident analysis and response.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Prerequisites: There are no prerequisites for this class Topics: Overview of Cyber Incident ManagementCyber Incident PreparationCyber Incident Detection and AnalysisContainment, Eradication, and RecoveryPost Incident ActivitiesApplying the Cyber Incident Management Process,Audience: This course is for IT professionals responsible for identifying and responding to cyber events, including local government, private industry, and critical infrastructure representatives. Other Information: In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |
Information Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
| Online Course Course DetailsDescription: Information Security Basics is designed to teach entry and mid-level IT staff the technological fundamentals of information security. The goal of this course is to provide trainees some preliminary knowledge of computer security to help in identifying and stopping various cyber threats. In addition to providing an introduction to information assurance, trainees will also learn general concepts (terminologies), an overview of TCP/IP, introductory network security, introductory operating system security, and basic cryptography.
Prerequisites: Must be a U.S. Citizen or Permanent Resident or receive approval from TEEX/DHS-FEMA prior to the start of the class. Please contact us at bcs@teex.tamu.edu or call (800) 541-7149 for more information on the approval process.
Topics: Overview and terminologyGeneral conceptsTCP/IP networkingNetwork securityOperating systems and securityCryptography,Audience: Emergency management agency
Emergency medical services
Fire service
Administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
Cyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to Internet usage today.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. | Online Course Course DetailsDescription: Cyber Ethics is designed to teach students the proper techniques with which to approach the difficult ethical dilemmas that arise from using the modern Internet. In addition to providing students with the skills to assess future ethical dilemmas for themselves, Cyber Ethics also looks at some of the more pressing concerns related to Internet usage today.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. Prerequisites: There are no prerequisites for this class Topics: Overview and terminologyPrivacyIntellectual propertyProfessional codes of ethicsFreedom of Speech on the internetIssues related to ethical hacking,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. | Online Course Course DetailsDescription: Information Security for Everyone is designed to teach the principles and practices that all computer users need to keep themselves safe, both at work and at home. By presenting best practices along with a small amount of theory, trainees are taught both what to do and why to do it. Topics covered include how to secure both clean and corrupted systems, protecting your personal data, securing simple computer networks, and safe Internet usage.
Two credit hours through ACE are provided only if all three courses within the Online for Everyone - Non-Technical (Cyber 101) track are completed. Prerequisites: There are no prerequisites for this class Topics: Safe internet usageSecuring a clean computerSecuring a corrupted computerProtecting your computer and its contentsSecuring computer networksSecure communications and information security best practicesMaintaining Privacy Guidelines for maintaining privacy while surfing the internet,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Everyone track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization's access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. | Online Course Course DetailsDescription: Disaster Recovery for Information Systems will train business managers to respond to varying threats that might impact their organization's access to information. This course provides requisite background theory and recommended best practices needed by managers to keep their offices running during incidents of different types. Topics include an overview of business continuity planning; disaster recovery planning; guides for implementing and managing disaster recovery plans, a discussion of technical vulnerabilities faced by organizations, and an examination of legal issues that may confront an organization.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Prerequisites: There are no prerequisites for this class Topics: Overview of business information continuityGuides for implementing and managing business information continuity planDiscussion of technical vulnerabilities faced by organizationsExamination of legal issues that may confront an organization,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. | Online Course Course DetailsDescription: This is an intermediate level course covering topics on information assets, identifying risks, and management processes highlighting best principles and practices. It will provide training on information risk-related tools and technologies (such as asset evaluation, business impact analysis, risk identification, risk quantification, risk response, security policies, and compliance) for better understanding of potential threats and vulnerabilities in business online, and learning to adopt levels of security measures and best practices.
Two credit hours through ACE are provided only if all three courses within the Online for Business Professionals (Cyber 301) track are completed. Prerequisites: There are no prerequisites for this class Topics: Introduction to Information Security Risk ManagementAsset evaluation and Business Impact AnalysisRisk identificationRisk quantificationRisk response development and controlSecurity policy, compliance, and business continuity,Audience: Emergency management agency
Emergency medical services
Fire service
Governmental administrative
Law enforcement
Healthcare
Public health
Public safety communications
Public works
Hazardous materials personnel
Other Information:
In order to receive the full two credit hours, all three classes in the Cybersecurity for Business Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us.
|
This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. | Online Course Course DetailsDescription: This course covers secure programming practices necessary to secure applications against attacks and exploits. Topics covered include fundamental concepts of secure software development, defensive programming techniques, secure design and testing, and secure development methodologies.
Two credit hours through ACE are provided only if all four courses within the Online for IT Professionals (Cyber 201) track are completed. Prerequisites: There are no prerequisites for this class Topics: Secure software programmingSecure software design and testingSecure software methodologies,Audience: - Software Developers
- IT Staff
- IT Managers
Other Information: In order to receive the full two credit hours, all four classes in the Cybersecurity for IT Professionals track must be successfully completed.
After registering for this online course, you will receive an email with instructions for getting started. If you do not receive a confirmation within one hour, please contact us. |